I've just seen a talk about tunnelling TCP/IP over DNS requests, because port 53 UDP is usually open and unfiltered. What techniques exist to detect and block such tunnels, and have you ever seen that ...

Are there client programs that allow me to "tunnel" through my SSH enabled server for normal Internet requests such as http/https?
If so what are they and can someone point me in the right direction?
...

What are some of the security concerns and reasons either for or against allowing X11 Forwarding. I have generally taken an approach of not allowing it under the blanket guise of security. Recently, ...

The Dangers of Open Wi-Fi
How does one go about sending valuable information (for example inputting email username and password) over a free password-less public WiFi network?
The only option that I ...

I'm looking for a way to tunnel all network communication from my laptop through another computer. I can control the software on both the laptop and the computer. The connection between them should be ...

How can I create a proxy tunnel from a network that has all ports but port 80 closed? I guess I'd have to bind SSH on my server to port 80, but would that introduce problems to my home network since ...

From my understanding, for incoming packets over IPSec, the Security Association (SA) is identified by the SPI field of the ESP header.
Then let's say I have a bunch of nodes where each node wants to ...

I am behind an HTTP proxy, and I frequently tunnel out via an ssh -D SOCKS proxy (I have access to a couple of outside servers which I can tunnel to) when the HTTP proxy causes problems1.
Now, this ...

I am curious why tunneling is so important in pen testing.
If one has control of one machine in a network, then using that machine, one can run nmap and web apps and try to find out vulnerabilities..
...

I noticed while hanging in Microsoft Network Monitor that my computer is sending ICMP echo request to an arbitrary IP address 202.39.253.11.
I looked for the owner of this IP and I found it is owned ...

PPTP has been demonstrated to be broken in many ways, and most installations are insecure. But it is also theoretically not broken if configured correctly.
As an end-user, is there a simple way for ...

We have an internal lan (not connected to internet, all internal ip addresses, behind a firewall, no routing to outside), we also have a machine that sits on the edge of our lan (two nics, one on the ...

What are the vulnerable areas when two endpoint connect via TLS? Does the physical layer or data link layer a factor of security concern between the two endpoints? Does it matter in terms of security, ...

I want to create reverse connection between two machines, but these is a firewall in the middle preventing all connections, except ssh. I want to create ssh tunnel using netcat, could you please tell ...

I connect to a DMZ gateway system (B) which is not secured. From this machine (B) I can connect to the final destination (C).
A-->B-->C
I created a ssh tunnel from A to B and forwarding the port 22 ...

I have a requirement to set up a SSH tunnel between two hosts. SSH server runs on a Linux host, and the SSH client (PuTTY) runs on a Windows host.
I have set up a separate user account (say 'tunnel') ...

I have a question about ssh tunneling.
Is it possible for the ISP to realize the destination server which I want to connect it via ssh tunneling? I mean the destination website which I want to visit ...

I have a local proxy on my PC. (localhost:8888)
But unfortunately there are many programs which are not able to go through this proxy.
So how can I force all my programs to go through my local proxy ...

We have two hosts, theoretically in the same data center. The two machines are hosted at Online.net. We're having a bit of a debate: should the traffic between the two hosts be encrypted.
The traffic ...

I've got an SSH server setup in a remote location, which I use to tunnel traffic from an android tablet. On the tablet, I have the Cisco AnyConnect app to connect to my company's VPN. We want to be ...

I have some questions about squid proxies, we set a squid proxy server to block certain web sites for users. and some users only can access one website that related to our work.but after install some ...

I recently saw a question in which someone implied that tunneling could foil MITM even if it were implemented while an MITM was taking place. My understanding of tunneling is that it is only capable ...

I have a network that is only accessible through bastion servers over ssh. In it, I am developing web applications that are exposed to end users via GUI's served up over websockets. All traffic into ...

We are thinking about using VPN to connect our remote office and the main office and also support developers working from home. To do this, we are planning to purchase 2 CISCO (or similar) routers to ...

Suppose I am a rogue employee and I want to syphon some sensitive data out of the office and I only have office internet access for this. My office internet access needs to go through a proxy server, ...

I'm looking for a good explanation of how connections work through firewalls.
I've got the idea of packaging(encapsulating) some protocol inside another one as its payload when tunneling.
But what I ...

Multitun is a tunnel that encrypts connections and sends them bulk over a web socket, which is a web standard. So firewalls that ensure the expected protocol is running on the allowed port, will just ...

We have a scenario where we cannot connect to our stunnel server running on port 443 on our network, which only allows access to Internet via a proxy server. On the contrary, when we tried a SSL VPN ...

Can I use tranport mode (instead of tunnel mode) in IPsec if I tunnel a VPN via UDP? I don't see why the header (that sets the protocol and port) needs to be encrypted in my case (I suspect it would ...

I've just set up a Raspberry Pi 2 with the latest raspbian and installed some services.
For remote access I've installed tightvnc server which I set up to only allow connections from localhost. I can ...

Is there some sort of a (free) SSH tunneling suite like the one on the Pwnie Express' Pwn Plug (R2)?
It has SSH over HTTP, DNS, ICMP, and other covert tunneling options and uses BackTrack 5 as a SSH ...

I am developing an application that runs on Windows PCs. The application is able to connect to some kind of devices within a LAN. It can create multiple TCP-connections to the device it is connected ...

Wherever I looked I only saw the description of NAT traversal for ESP protocol (for example: http://pic.dhe.ibm.com/infocenter/iseries/v6r1m0/index.jsp?topic=/rzaja/rzajaudpencap.htm)
It's looks that ...

I was using a socks proxy to access websites blocked by my ISP, now it don't work any more in an strange way. Using the proxy is same as not using it! (i.e. I can access open sites but filtered sites ...

I am currently on a IPv4 network. The IPv4 network is accessed by a router, which gives my machines IPv4 addresses via NAT.
On one of the machines, a Windows 2008 64-bit machine, I have set up a IPv6 ...

I know your time is valuable so I'm not waiting for specific answers to my situation. I don't mind reading documentation, so pointers to something that converges would be greatly appreciated. I don't ...

How can SSL tunneling be used to attack a target, and how can I prevent such thing from happening? Does modern network/appliction firewalls have the capability to detect SSL tunneling? thanks
Update: ...

I have a 15 yr old daughter who's become not only a certified Microsoft Expert, but by pure accident, it came to my attention she'd long ago created a SPLIT network connection on our internet, HIDDEN ...